Analysis

  • max time kernel
    188s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 23:39

General

  • Target

    a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe

  • Size

    164KB

  • MD5

    5313f9c201fbaaf4be43d7d9e6249b89

  • SHA1

    5cf30234ad84577a51c8f3e72c0eda5f778a198c

  • SHA256

    a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29

  • SHA512

    d4387c753268dffd8e79a0cecacb6881ae4d1271a30ba44b0efac0197dac75a33159a4038632443d49fd3a53f4cd479042c8a19b00592e76a677a3b643583b9c

  • SSDEEP

    1536:alhtkWAlIS4i7TLhLsNgqi4Cr3DEaUJBYiVIHvUdR/eDoZJAO1dGV4VE:SWW04i7ZLsNgqE3ofJBYiVIiMDoZ3dG

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 58 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe
    "C:\Users\Admin\AppData\Local\Temp\a110d8607ae1ca197564f46341cb2ad1fc908c91319bd2108fa164db1f4feb29.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3220
    • C:\Users\Admin\yuuunon.exe
      "C:\Users\Admin\yuuunon.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:4392

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\yuuunon.exe

    Filesize

    164KB

    MD5

    fc7280307c3bc9f59625fbcc3848d094

    SHA1

    56b2aafe26fc6efbb6f3950ff154b4e2314bdb41

    SHA256

    fb47bdae0af29bf8d68837ea9d7afdc66594a1505d1fee51410d16328579cef4

    SHA512

    19ce8a635d7a11bc0fb4483e7b2e2ed71021b03021981e809da3b310c2940cb26d1bd9d539a4a3d5e22fb7bae3a9354314dba4a9a4f66e0dd9308058c93da811

  • C:\Users\Admin\yuuunon.exe

    Filesize

    164KB

    MD5

    fc7280307c3bc9f59625fbcc3848d094

    SHA1

    56b2aafe26fc6efbb6f3950ff154b4e2314bdb41

    SHA256

    fb47bdae0af29bf8d68837ea9d7afdc66594a1505d1fee51410d16328579cef4

    SHA512

    19ce8a635d7a11bc0fb4483e7b2e2ed71021b03021981e809da3b310c2940cb26d1bd9d539a4a3d5e22fb7bae3a9354314dba4a9a4f66e0dd9308058c93da811